DocumentCode :
237929
Title :
Dynamic ECDH mechanism for enhancing privacy of voice calls on mobile phones over VoIP server
Author :
Ashok, S. ; Arjun, A. ; Subashri, T.
Author_Institution :
Dept. of Electron. Eng., Anna Univ., Chennai, India
fYear :
2014
fDate :
8-10 May 2014
Firstpage :
1179
Lastpage :
1184
Abstract :
VoIP networks are prone to confidentiality threats due to weak keys used by the AES algorithm for encryption of VoIP packets. So, in order to strengthen the key for encryption and decryption, Elliptic Curve Diffie-Hellman (ECDH) Algorithm key agreement scheme is employed with smaller key sizes resulting in faster computations. This Paper presents the Design and Implementation of an Asterisk VoIP server which serves as an exchange for placing voice calls in private Wi-Fi cloud and legacy networks. Voice over internet protocol refers to the transmission of speech across networks. The elliptic curve used in this paper is a modified NIST P-256 curve. The key generated by ECDH is highly secure because the discrete logarithmic problem is very difficult to crack in this scheme. This Method is successfully carried out for voice calls on supported handhelds connected with the wireless network. Further, every user is provided with his/her own extension number that can be used to connect to and from the outside world. This ECDH key exchanging mechanism for voice calls in real time is implemented using Asterisk PBX (Private Branch eXchange), which is an open source software.
Keywords :
Internet telephony; computer network security; mobile handsets; private telephone exchanges; public key cryptography; radio networks; voice communication; wireless LAN; AES algorithm; Asterisk PBX; Asterisk VoIP server Implementation; NIST P-256 curve; VoIP packet encryption; Wi-Fi cloud; decryption; discrete logarithmic problem; dynamic ECDH mechanism; elliptic curve Diffie-Hellman algorithm key agreement scheme; legacy network; mobile phone; open source software; private branch exchange; speech transmission; voice call privacy enhancement; voice over Internet protocol; wireless network; DH-HEMTs; Encryption; Generators; IEEE 802.11 Standards; Lead; Servers; Asterisk PBX; Dynamic ECDH; IAX; Key exchange; SIP; Softphone; VoIP; wireless communications;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Communication Control and Computing Technologies (ICACCCT), 2014 International Conference on
Conference_Location :
Ramanathapuram
Print_ISBN :
978-1-4799-3913-8
Type :
conf
DOI :
10.1109/ICACCCT.2014.7019284
Filename :
7019284
Link To Document :
بازگشت